🔐 CVE Alert

CVE-2023-7334

UNKNOWN 0.0

Changjetong T+ <= 16.x GetStoreWarehouseByStore Deserialization RCE

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Changjetong T+ versions up to and including 16.x contain a .NET deserialization vulnerability in an AjaxPro endpoint that can lead to remote code execution. A remote attacker can send a crafted request to /tplus/ajaxpro/Ufida.T.CodeBehind._PriorityLevel,App_Code.ashx?method=GetStoreWarehouseByStore with a malicious JSON body that leverages deserialization of attacker-controlled .NET types to invoke arbitrary methods such as System.Diagnostics.Process.Start. This can result in execution of arbitrary commands in the context of the T+ application service account. Exploitation evidence was observed by the Shadowserver Foundation as early as 2023-08-19 (UTC).

CWE CWE-502
Vendor changjetong information technology co., ltd.
Product t+
Published Jan 15, 2026
Last Updated Mar 23, 2026
Stay Ahead of the Next One

Get instant alerts for changjetong information technology co., ltd. t+

Be the first to know when new unknown vulnerabilities affecting changjetong information technology co., ltd. t+ are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Changjetong Information Technology Co., Ltd. / T+
0 ≤ 16.*

References

NVD ↗ CVE.org ↗ EPSS Data ↗
chanjetvip.com: https://www.chanjetvip.com/product/goods/detail?id=6077e91b70fa071069139f62 freebuf.com: https://www.freebuf.com/articles/web/381731.html blog.csdn.net: https://blog.csdn.net/qq_53003652/article/details/134031230 blog.csdn.net: https://blog.csdn.net/u010025272/article/details/131553591 github.com: https://github.com/MD-SEC/MDPOCS/blob/main/ChangJieTongTPlus_GetStoreWarehouseByStore_Rce_Poc.py vulncheck.com: https://www.vulncheck.com/advisories/changjetong-tplus-getstorewarehousebystore-deserialization-rce